mikeguidry / clockworkView external linksLinks
general framework for creating robots, worms, and backdoors
☆11Nov 13, 2017Updated 8 years ago
Alternatives and similar repositories for clockwork
Users that are interested in clockwork are comparing it to the libraries listed below
Sorting:
- Proof of concept open source implementation of an UAC bypass exploit, based in 2 windows failures.☆12Jun 2, 2020Updated 5 years ago
- I agree with mass surveillance, but not government corruption. This is the result.☆11Jun 20, 2020Updated 5 years ago
- ☆13Jul 24, 2022Updated 3 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- Monitor JSON notifications feed from VT☆17Jun 13, 2017Updated 8 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- Android input method for hardware keyboards☆20Feb 20, 2024Updated last year
- Armadito module for PDF document analysis.☆18Aug 3, 2017Updated 8 years ago
- metasploit loader with antivirus bypass module☆18Jun 26, 2016Updated 9 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- Source code for Modbus/TCP fuzzer used for ETFA 2015 paper☆21Feb 6, 2025Updated last year
- Analysis of BankBot/Mazain: An Open Source Banking Trojan That Targets Android Devices☆22May 14, 2017Updated 8 years ago
- Remote code execution in Power Platform connectors via JSON deserialization☆23Mar 30, 2023Updated 2 years ago
- Protects and logs suspicious and malicious usage of .NET CSC.exe and Runtime C# Compilation☆25May 3, 2018Updated 7 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- Blog posts☆29Aug 7, 2020Updated 5 years ago
- This repository contains the POC of an exploit for node-jose < 0.11.0☆25Feb 24, 2023Updated 2 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆90Sep 10, 2013Updated 12 years ago
- XXE attack tool☆31Feb 20, 2016Updated 9 years ago
- Just a proof of concept Linux rootkit that reads from syscalls.☆24Jun 22, 2018Updated 7 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆38Dec 7, 2025Updated 2 months ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Aug 18, 2016Updated 9 years ago
- Gathers public information on companies to highlight social engineering risk.☆30May 25, 2016Updated 9 years ago
- Bypass antivirus with dynamic import. Hide the api(s) used.☆28Apr 2, 2016Updated 9 years ago
- Free KeyLogger for Kali Linux and Ubuntu☆37Feb 21, 2016Updated 9 years ago
- A log4shell detector using ProGuardCORE☆10Aug 5, 2022Updated 3 years ago
- Automated forensics written in PowerShell☆34Sep 29, 2019Updated 6 years ago
- Experiments in trying to find 0-days in numpy☆38Jul 1, 2017Updated 8 years ago
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆38Jul 14, 2017Updated 8 years ago
- Unfixed Windows PowerShell Filename Code Execution POC☆41Dec 26, 2023Updated 2 years ago
- CVE-2022-26135☆11Jul 12, 2022Updated 3 years ago
- A controlled environment for demonstrating and understanding buffer overflow vulnerabilities in web applications. This project is designe…☆24Jan 27, 2025Updated last year
- Python Application to Reverse Freezing☆36Jul 21, 2016Updated 9 years ago
- Dredmorpedia is an automatically generated encyclopedia for the game Dungeons of Dredmor.☆11Oct 24, 2022Updated 3 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- A Windows kernel driver unit testing framework. Provides a macro free modern cpp syntax. Includes tools for automatic running on your vm.☆11May 15, 2023Updated 2 years ago